Follow
King Hang Wang, Kevin
King Hang Wang, Kevin
Verified email at comp.hkbu.edu.hk
Title
Cited by
Cited by
Year
A secure authentication protocol for internet of vehicles
CM Chen, B Xiang, Y Liu, KH Wang
Ieee Access 7, 12047-12057, 2019
2202019
On the security of Chien's ultralightweight RFID authentication protocol
HM Sun, WC Ting, KH Wang
IEEE Transactions on Dependable and Secure Computing 8 (2), 315-317, 2009
1642009
A provably secure certificateless public key encryption with keyword search
TY Wu, CM Chen, KH Wang, C Meng, EK Wang
Journal of the Chinese Institute of Engineers 42 (1), 20-28, 2019
1292019
Attacks and solutions on a three-party password-based authenticated key exchange protocol for wireless communications
CM Chen, KH Wang, KH Yeh, B Xiang, TY Wu
Journal of Ambient Intelligence and Humanized Computing 10 (8), 3133-3142, 2019
1262019
Spate: small-group pki-less authenticated trust establishment
YH Lin, A Studer, YH Chen, HC Hsiao, LH Kuo, JM McCune, KH Wang, ...
IEEE Transactions on Mobile Computing 9 (12), 1666-1681, 2010
1192010
On the security of a new ultra-lightweight authentication protocol in IoT environment for RFID tags
KH Wang, CM Chen, W Fang, TY Wu
The Journal of Supercomputing 74 (1), 65-70, 2018
1172018
A secure authenticated and key exchange scheme for fog computing
CM Chen, Y Huang, KH Wang, S Kumari, ME Wu
Enterprise Information Systems 15 (9), 1200-1215, 2021
1102021
A secure authentication scheme for internet of things
KH Wang, CM Chen, W Fang, TY Wu
Pervasive and Mobile Computing 42, 15-26, 2017
762017
A review of contemporary e-voting: Requirements, technology, systems and usability
KH Wang, SK Mondal, K Chan, X Xie
Data Science and Pattern Recognition 1 (1), 31-47, 2017
742017
A study of user-friendly hash comparison schemes
HC Hsiao, YH Lin, A Studer, C Studer, KH Wang, H Kikuchi, A Perrig, ...
2009 Annual Computer Security Applications Conference, 105-114, 2009
722009
An anonymous mutual authenticated key agreement scheme for wearable sensors in wireless body area networks
CM Chen, B Xiang, TY Wu, KH Wang
Applied Sciences 8 (7), 1074, 2018
582018
Security analysis and enhancement of a certificateless searchable public key encryption scheme for IIoT environments
TY Wu, CM Chen, KH Wang, JMT Wu
IEEE Access 7, 49232-49239, 2019
462019
A scalable transitive human-verifiable authentication protocol for mobile devices
CM Chen, KH Wang, TY Wu, JS Pan, HM Sun
IEEE Transactions on Information Forensics and Security 8 (8), 1318-1330, 2013
432013
On the security of a three-party authenticated key agreement protocol based on chaotic maps
CM Chen, KH Wang, TY Wu, EK Wang
Data Sci. Pattern Recognit. 1 (2), 1-10, 2017
382017
Comments on “an improved secure and efficient password and chaos-based two-party key agreement protocol”
CM Chen, W Fang, KH Wang, TY Wu
Nonlinear Dynamics 87 (3), 2073-2075, 2017
352017
A robust mutual authentication with a key agreement scheme for session initiation protocol
CM Chen, B Xiang, KH Wang, KH Yeh, TY Wu
Applied Sciences 8 (10), 1789, 2018
302018
On the security of an efficient time-bound hierarchical key management scheme
HM Sun, KH Wang, CM Chen
IEEE transactions on dependable and secure computing 6 (2), 159-160, 2009
302009
A native APIs protection mechanism in the kernel mode against malicious code
HM Sun, H Wang, KH Wang, CM Chen
IEEE Transactions on Computers 60 (6), 813-823, 2011
282011
Security Analysis of Rhee et al.'s Public Encryption with Keyword Search Schemes: A Review.
TY Wu, CM Chen, KH Wang, JS Pan, W Zheng, SC Chu, JF Roddick
J. Netw. Intell. 3 (1), 16-25, 2018
252018
On the security of the secure arithmetic code
HM Sun, KH Wang, WC Ting
IEEE transactions on information forensics and security 4 (4), 781-789, 2009
222009
The system can't perform the operation now. Try again later.
Articles 1–20